SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Transform your organization’s cybersecurity by institutionalizing a strong security culture where leadership and workforce prioritize security in their everyday actions and initiatives.
This content is helping bring back concepts that get forgotten when you go from a doer to a senior leadership role. It brought back good concepts and a way to utilize them in the Security Context as well as getting leadership to think differently.
The SANS LDR521: Security Culture for Leaders course teaches cybersecurity leaders how to build, measure, and sustain a strong cybersecurity culture across their organization. Through hands-on labs, real-world scenarios, and proven behavioral science frameworks, participants learn how to gain executive buy-in, engage the workforce, and integrate security into everyday business practices. This course is ideal for experienced security professionals looking to drive meaningful cultural change and elevate the impact of their security programs.
Russell is a Principal Consultant and Co-Founder of Cyverity with extensive cybersecurity leadership experience. As former CIO and CISO of the Federal Reserve Bank of Atlanta, he brings real-world expertise to his role as SANS Principal Instructor.
Read more about Russell EubanksLance revolutionized cyber defense by founding the Honeynet Project. Over the past 25 years, he has helped 350+ organizations worldwide build resilient security cultures, transforming human risk management into a cornerstone of modern cybersecurity.
Read more about Lance SpitznerExplore the course syllabus below to view the full range of topics covered in LDR521: Security Culture for Leaders.
Learn the foundations of security culture, how to map your organization's current culture, and build a roadmap to achieve the security culture you want. Apply proven organizational change models to drive cultural transformation.
Discover how to effectively engage and motivate your workforce to prioritize cybersecurity. Learn marketing models, persona development, and incentive programs that drive behavioral change across the organization.
Learn to overcome the "Curse of Knowledge" by making security simple for all employees. Develop effective training approaches, streamline policies, and implement metrics to track and demonstrate security culture impact.
Develop proficiency in getting executive support by speaking leadership's language. Learn to build compelling business cases, understand financial impacts, and effectively communicate security value to senior leadership.
Apply everything you've learned in a simulated environment to build a security culture at a fictional company. Teams compete to make strategic decisions that impact security outcomes, with the winning team earning the coveted LDR521 Challenge Coin.
Perform cybersecurity audits on the organisation’s ecosystem. Ensuring compliance with statutory, regulatory, policy information, security requirements, industry standards and best practices.
Explore learning pathResponsible for developing, planning, coordinating, and evaluating cybersecurity awareness, training, or education content, methods, and techniques based on instructional needs and requirements.
Explore learning pathPlans and designs security-by-design solutions (infrastructures, systems, assets, software, hardware and services) and cybersecurity controls.
Explore learning pathLead, govern, and manage this risk for your organization.
Explore learning pathCollect, process, analyse data and information to produce actionable intelligence reports and disseminate them to target stakeholders.
Explore learning pathResponsible for overseeing and directly managing technology projects. Ensures cybersecurity is built into projects to protect the organization’s critical infrastructure and assets, reduce risk, and meet organizational goals. Tracks and communicates project status and demonstrates project value to the organization.
Explore learning pathResponsible for managing the cybersecurity of a program, organization, system, or enclave.
Explore learning pathResponsible for managing the Communications Security (COMSEC) resources of an organization.
Explore learning pathDaily focus is on the leadership of technical teams. Includes titles such as Technical Director, Manager, and Team Lead.
Explore learning pathManage the organisation's cybersecurity-related risks aligned to the organisation’s strategy. Develop, maintain and communicate the risk management processes and reports.
Explore learning pathThis expert applies digital forensic skills to a plethora of media that encompasses an investigation. If investigating computer crime excites you, and you want to make a career of recovering file systems that have been hacked, damaged or used in a crime, this may be the path for you. In this position, you will assist in the forensic examinations of computers and media from a variety of sources, in view of developing forensically sound evidence.
Explore learning pathImproves cybersecurity knowledge, skills and competencies of humans.
Explore learning pathResponsible for leading, coordinating, and the overall success of a defined program. Includes communicating about the program and ensuring alignment with agency or organizational priorities.
Explore learning pathAssess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.
Explore learning pathEnsure the cybercriminal investigation reveals all digital evidence to prove the malicious activity.
Explore learning pathResearch the cybersecurity domain and incorporate results in cybersecurity solutions.
Explore learning pathManages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.
Explore learning pathNICE Framework: Cybersecurity Workforce Management (OPM 751)
Explore learning pathResponsible for establishing vision and direction for an organization's cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.
Explore learning pathDevelop, deploy and operate cybersecurity solutions (systems, assets, software, controls and services) on infrastructures and products.
Explore learning pathWhen purchasing a live, instructor-led course, add 4 months of online access. View price in the info icons below.
Add 6 months of hands-on skills practice. Add to your cart when purchasing your course.
Lance was fantastic! He made the course super engaging and covered all information thoroughly, making sure to draw in and leverage student experience to make the course richer.
I am just so happy with this material focusing on embedding secure values into our global culture - exactly what my company needs help with NOW.
Entertaining and thought provoking and helped me understand what actions I can take to change the culture of my company.
I love the way each lab built on previous topics covered culminating in the last day where we could apply everything we learnt. Everytime we did a lab they were well explained and at no time did i feel rushed, or like we had too much time to complete them.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources